Google making the Web faster with protocol that reduces round trips

Can Google’s QUIC be faster than Mega Man’s nemesis, Quick Man? Josh Miller Google, as is its wont, is always trying to make the World Wide Web go faster. To that end, Google in 2009 unveiled SPDY , a networking protocol that reduces latency and is now being built into HTTP 2.0. SPDY is now supported by Chrome, Firefox, Opera, and the upcoming Internet Explorer 11 . But SPDY isn’t enough. Yesterday, Google released a boatload of information about its next protocol, one that could reshape how the Web routes traffic. QUIC—standing for Quick UDP Internet Connections—was created to reduce the number of round trips data makes as it traverses the Internet in order to load stuff into your browser. Although it is still in its early stages, Google is going to start testing the protocol on a “small percentage” of Chrome users who use the development or canary versions of the browser—the experimental versions that often contain features not stable enough for everyone. QUIC has been built into these test versions of Chrome and into Google’s servers. The client and server implementations are open source, just as Chromium is. Read 11 remaining paragraphs | Comments

Original post:
Google making the Web faster with protocol that reduces round trips

Password complexity rules more annoying, less effective than lengthy ones

Few Internet frustrations are so familiar as the password restriction . After creating a few (dozen) logins for all our Web presences, the use of symbols, mixed cases, and numbers seems less like a security measure and more like a torture device when it comes to remembering a complex password on a little-used site. But at least that variety of characters keeps you safe, right? As it turns out, there is some contrary research that supports both how frustrating these restrictions are and suggests it’s possible that the positive effect of complexity rules on security may not be as great as long length requirements. Let’s preface this with a reminder: the conventional wisdom is that complexity trumps length every time, and this notion is overwhelmingly true. Every security expert will tell you that “Supercalifragilistic” is less secure than “gj7B!!!bhrdc.” Few password creation schemes will render any password uncrackable, but in general, length does less to guard against crackability than complexity. A password is not immune from cracking simply by virtue of being long—44,991 passwords recovered from a dump of LinkedIn hashes last year were 16 characters or more. The research we describe below refers specifically to the effects of restrictions placed by administrators on password construction on their crackability. By no means does it suggest that a long password is, by default, more secure than a complex one. Read 13 remaining paragraphs | Comments

Continue reading here:
Password complexity rules more annoying, less effective than lengthy ones

Hands-on with Windows 8.1 Preview: Windows 8 done right

Late last month, Microsoft announced a raft of interface changes that Windows 8.1 would introduce. We’ve been giving them a spin. As you might guess from the name, Windows 8.1 is an update to (and improvement on) Windows 8. The new user interface introduced in that operating system—the Start screen, touch-friendly “Modern” apps, the charms bar—is retained in Windows 8.1. What we see is a refinement and streamlining of these concepts. The new Start screen is a pleasing evolution of the old one. The differences are visible as soon as you log in. In 8.1, the Start screen offers a lot more flexibility over layout and tile sizing. By default, the Weather tile takes advantage of this, using a new double-height tile size to show the forecasts for both today and tomorrow, in addition to the current conditions. Read 22 remaining paragraphs | Comments

Visit site:
Hands-on with Windows 8.1 Preview: Windows 8 done right

Hands-on with the Windows “Blue” desktop experience

The Beta fish is back in the new Windows “Blue” previews. This week, Microsoft is unveiling the previews for its Windows “Blue” operating systems—the Windows 8.1 client, Windows Server 2012 R2, and an update to Windows Server Essentials.  Last night, Microsoft released the previews through its MSDN and TechNet programs for its server platforms, which include a feature called “Desktop Experience”—an add-on which gives the server versions of the platform the same interface as Windows 8.1. As a result, Microsoft has tipped its hand about some of the interface changes it will be showing in the preview of the client, which it will release later this week. Here’s a quick look at the most significant changes in the interface we’ve found in our first hands-on with the preview revisions.   Read on Ars Technica | Comments

More here:
Hands-on with the Windows “Blue” desktop experience

Microsoft promises annual Windows Server updates, can IT cope?

Windows Server 2012 will be updated this autumn to Windows Server 2012 R2. This will be the first in a series of more or less annual updates to the Windows Server platform. It’s not just the operating system that’ll get these regular updates, either. On the server side, System Center and SQL Server are also going to be on an annual cadence. On the client side, Visual Studio will be too. Even though Windows Server 2012 is less than a year old, Microsoft promises a stack of new features for the R2 iteration. Hyper-V, in particular, has some compelling improvements: legacy-free, UEFI-booting “generation 2” virtual machines, faster live migration, live cloning of VMs, online disk resizing, and support for live migration, backup, disk resizing, and dynamic memory for Linux guests. Windows’ pooled storage system, Storage Spaces, is set to become a lot smarter. Pools can use a mix of solid state and spinning disk media, and the Storage Space software will automatically move hot data off the spinning disks and onto the solid state ones. Read 10 remaining paragraphs | Comments

Excerpt from:
Microsoft promises annual Windows Server updates, can IT cope?

Haswell is here: we detail Intel’s first 4th-generation Core CPUs

Intel is announcing the first of its fourth-generation Core processors based on the “Haswell” architecture. Intel Intel has been releasing information about Haswell, its next-generation CPU architecture, for months now. Our coverage has already been fairly extensive—we’ve already got a nice overview of Haswell’s CPU architecture itself, along with a primer on its brand-new integrated GPUs . All we need to know now is specific product information, and Intel is finally giving us our first official taste of that today. This morning’s announcements revolve around high-end quad-core chips in the Core i7 and Core i5 families, 12 for desktops and ten for laptops. If you’re looking for specific information about U- and Y- series low-voltage chips for Ultrabooks or anything belonging to the Core i3, Pentium, or Celeron families, you’ll have to wait a little while longer. We’ll be sure to pass that information along as we have it. What we’ll do here is present a high-level recap of the CPU, GPU, and chipset enhancements Intel is introducing in Haswell. After that, we’ll break down the specific CPUs that Intel is announcing today, and the kinds of systems you’re likely to find them in. Note that all of this information is coming directly from Intel—they’re not going to out-and-out make things up, but they’re definitely going to present their CPUs in the best possible light. We’ll be putting all of the below performance claims to the test as we begin to review Haswell-based systems later this summer. Read 30 remaining paragraphs | Comments

More:
Haswell is here: we detail Intel’s first 4th-generation Core CPUs

“SpecialisRevelio!” Macs use Harry Potter spell to unlock secret “backdoor”

Aurich Lawson / Warner Bros. Entertainment The Mac on your desk or on the cafe table next to you has a chip with secret functions that can be unlocked only by inputting a spell from the Harry Potter series. The SMC, or system management controller, is a chip used to regulate a Mac’s current and voltage, manage its light sensor, and temporarily store FileVault keys. Turns out that the SMC contains undocumented code that is invoked by entering the word “SpecialisRevelio,” the same magic words used to reveal hidden charms, hexes, or properties used by wizards in the Harry Potter  series written by author J. K. Rowling. That fun fact was presented Wednesday at the NoSuchCon security conference by veteran reverse engineer Alex Ionescu. While most details are far too technical for this article, the gist of the research is that the SMC is a chip that very few people can read but just about anyone with rudimentary technical skills can “flash” update. Besides displaying the Apple engineers’ affinity for Harry Potter, Ionescu’s tinkerings also open the door to new types of hacks. But don’t worry because they’re mostly the fodder for a hacking scene in a James Bond or Mission Impossible screenplay. “The attacks discussed in my presentation are attacks that likely only a nation-state adversary would have the sufficient technical knowledge to implement, and they require precise knowledge of the machine that is being targeted,” Ionescu, who is chief architect at security firm CrowdStrike, wrote in an e-mail to Ars. “They are perfect, for example, at a border crossing where a rogue country may need to ‘take a quick look at your laptop’ to ‘help prevent terrorism.’ I don’t suspect most Mac users (and certainly not those that read Ars or other similar publications) would be at a high-profile enough level to warrant such level of interest from another state.” Read 7 remaining paragraphs | Comments

View post:
“SpecialisRevelio!” Macs use Harry Potter spell to unlock secret “backdoor”

VMware’s dual-persona smartphones phones finally available to purchase

The first two phones to run VMware’s dual-persona software. VMware At long last, VMware’s dual-persona software for smartphones is available on actual devices. Today, VMware and Verizon Wireless announced that the Android-based LG Intuition and Motorola Razr M can now be purchased with VMware’s Horizon Mobile software, which separates the device into isolated partitions that keep a user’s work applications and data separate from personal stuff. VMware began promising virtualized smartphones in 2010 , claiming they would be available for sale in 2011. Samsung promised to support VMware’s virtualized phone vision in September 2011, and VMware started promising virtualization for iPhones and iPads in August 2012. We called it ” vaporware .” Samsung and Apple devices still aren’t running the dual-persona software, but it’s nice to see VMware phones finally materialize. VMware and Verizon said the Intuition and Razr M are immediately available for sale with Horizon Mobile software. Perpetual licenses to Horizon Mobile start at $125 per user and “can be purchased through local resellers of VMware and Verizon Wireless,” the companies said. Read 5 remaining paragraphs | Comments

See more here:
VMware’s dual-persona smartphones phones finally available to purchase

Obama orders agencies to make data open, machine-readable by default

Alpha.data.gov, an experimental data portal created under the White House’s Open Data Initiative. Data.gov President Barack Obama issued an executive order today that aims to make “open and machine-readable” data formats a requirement for all new government IT systems. The order would also apply to existing systems that are being modernized or upgraded. If implemented, the mandate would bring new life to efforts started by the Obama administration with the launch of Data.gov four years ago. It would also expand an order issued in 2012 to open up government systems with public interfaces for commercial app developers. “The default state of new and modernized Government information resources shall be open and machine readable,” the president’s order reads. “Government information shall be managed as an asset throughout its life cycle to promote interoperability and openness, and, wherever possible and legally permissible, to ensure that data are released to the public in ways that make the data easy to find, accessible, and usable.” The order, however, also requires that this new “default state” protect personally identifiable information and other sensitive data on individual citizens, as well as classified information. Broadening the “open” mandate The president’s mandate was initially pushed forward by former Chief Information Officer of the United States Vivek Kundra. In May of 2009, Data.gov launched with an order that required agencies to provide at least three “high-value data sets” through the portal. Read 6 remaining paragraphs | Comments

Link:
Obama orders agencies to make data open, machine-readable by default

Network Solutions seizes over 700 domains registered to Syrians

While Syria’s Internet connection is back up, many of the sites hosted in Damascus have lost their domain names. As Brian Krebs of Krebs on Security reports , the domain registrar Network Solutions LLC has taken control of 708 domain names in the .com, .org, and .net top-level domains registered to Syrian organizations. The organizations affected by the seizure include the state-supported hacker group Syrian Electronic Army. Usually when there’s a domain name seizure, it’s the work of government agencies like Immigrations and Customs Enforcement or the FBI, or domains are shut down with the help of US Marshals as part of a court-sanctioned seizure related to malware. But in this case, Network Solutions appears to have seized the domains in question without coordinating with federal authorities, though its action was guided by federal regulations—domain name registration is one of the services explicitly banned in US trade sanctions enacted against Syria last year. Network Solutions has marked the seized domains with the notation “OFAC Holding,” indicating they were taken over in accordance with regulations propagated by the Department of the Treasury’s  Office of Foreign Assets Control , a unit of Treasury’s Office of Terrorism and Financial Intelligence. The vast majority of the seized domains were pointed at IP addresses assigned to the Syrian Computer Society. As we’ve reported previously, Syrian President Bashar al-Assad, who was an Army doctor and ophthalmologist before being groomed to take over for his father, was head of the Syrian Computer Society in the 1990s. He became president in 2000. The Syrian Computer Society acts as Syria’s domain registration authority and regulates the Internet within Syria, and is also believed to be connected to Syria’s state security apparatus. The Syrian Computer Society registered .sy domain names for the Syrian Electronic Army’s servers, giving the hacker group a national-level domain name (sea.sy) rather than a .com or other non-government address, signifying its status as at least a state-supervised operation. Read 1 remaining paragraphs | Comments

See the article here:
Network Solutions seizes over 700 domains registered to Syrians